Measuring the emergence of consent management on the web

M Hils, DW Woods, R Böhme - Proceedings of the ACM Internet …, 2020 - dl.acm.org
Privacy laws like the General Data Protection Regulation (GDPR) and the California
Consumer Privacy Act (CCPA) have pushed internet firms processing personal data to …

Mental model-based designs: the study in privacy policy landscape

H Atashpanjeh, R Paudel… - International Journal of …, 2024 - Taylor & Francis
Users' mental models influence secure and privacy-preserving behavior in a computing
environment. Prior studies on users' mental models of Internet, security tools, and digital …

The polarizing content warning: how the media can reduce affective polarization

E Kubin, C von Sikorski - Human Communication Research, 2024 - academic.oup.com
Past research suggests that journalists can (unintentionally) exacerbate affective
polarization when reporting on growing levels of polarization in society. However, is there a …

Misinformation warnings: Twitter's soft moderation effects on COVID-19 vaccine belief echoes

F Sharevski, R Alsaadi, P Jachim, E Pieroni - Computers & security, 2022 - Elsevier
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users
about the spread of COVID-19 misinformation. This form of soft moderation comes in two …

[HTML][HTML] (Mis) perceptions and engagement on Twitter: COVID-19 vaccine rumors on efficacy and mass immunization effort

F Sharevski, A Huff, P Jachim, E Pieroni - International Journal of …, 2022 - Elsevier
This paper reports the findings of a 606-participant study analyzing the perception of, and
engagement with, COVID-19 vaccine rumors on efficacy and mass immunization effort on …

Phishing with malicious QR codes

F Sharevski, A Devine, E Pieroni, P Jachim - Proceedings of the 2022 …, 2022 - dl.acm.org
The use of QR codes for malicious purposes was rather limited in the pre-COVID-19 world.
That changed overnight, as the QR codes became a convenient go-between for sharing …

On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security

C Stransky, D Wermke, J Schrader, N Huaman… - … Symposium on Usable …, 2021 - usenix.org
Communication tools with end-to-end (E2E) encryption help users maintain their privacy.
Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience …

Assessing Suspicious Emails with Banner Warnings Among Blind and {Low-Vision} Users in Realistic Settings

F Sharevski, A Zeidieh - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Warning users about suspicious emails usually happens through visual interventions such
as banners. Evidence from laboratory experiments shows that email banner warnings are …

Meaningful context, a red flag, or both? preferences for enhanced misinformation warnings among us twitter users

F Sharevski, A Devine, P Jachim, E Pieroni - Proceedings of the 2022 …, 2022 - dl.acm.org
Warning users about misinformation on social media is not a simple usability task. Soft
moderation has to balance between debunking falsehoods and avoiding moderation bias …

“Taking out the trash”: Why security behavior change requires intentional forgetting

J Hielscher, A Kluge, U Menges… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security awareness is big business–virtually every organization in the Western world
provides some form of awareness or training, mostly bought from external vendors …